Chin-Chen CHANG


Secure Key Transfer Protocol Based on Secret Sharing for Group Communications
Chia-Yin LEE Zhi-Hui WANG Lein HARN Chin-Chen CHANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/11/01
Vol. E94-D  No. 11  pp. 2069-2076
Type of Manuscript:  INVITED PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
key transfer protocolgroup keyDiffie-Hellman key agreementsecret sharing
 Summary | Full Text:PDF(222.2KB)

A Secure Multicast Framework in Large and High-Mobility Network Groups
Jung-San LEE Chin-Chen CHANG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2009/07/01
Vol. E92-B  No. 7  pp. 2365-2373
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
multicast communicationscalabilityforward secrecybackward secrecyhigh-mobility
 Summary | Full Text:PDF(229.8KB)

LSB-Based Steganography Using Reflected Gray Code
Chang-Chu CHEN Chin-Chen CHANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/04/01
Vol. E91-D  No. 4  pp. 1110-1116
Type of Manuscript:  PAPER
Category: Image Processing and Video Processing
Keyword: 
steganographyLSBGray code
 Summary | Full Text:PDF(689KB)

Reversible Steganographic Method with High Payload for JPEG Images
Chih-Yang LIN Chin-Chen CHANG Yu-Zheng WANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/03/01
Vol. E91-D  No. 3  pp. 836-845
Type of Manuscript:  PAPER
Category: Image Processing and Video Processing
Keyword: 
JPEGreversible steganographyDCTlossless data hiding
 Summary | Full Text:PDF(1.4MB)

A Color Image Authentication Method Using Partitioned Palette and Morphological Operations
Chin-Chen CHANG Pei-Yu LIN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/01/01
Vol. E91-D  No. 1  pp. 54-61
Type of Manuscript:  PAPER
Category: Image Processing and Video Processing
Keyword: 
image authenticationtamper-proofingpalettemorphological operation
 Summary | Full Text:PDF(2MB)

Hiding Secret Information Using Adaptive Side-Match VQ
Chin-Chen CHANG Wen-Chuan WU Chih-Chiang TSOU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2007/10/01
Vol. E90-D  No. 10  pp. 1678-1686
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
adaptive embeddingcompressiondata hidingside-match vector quantization
 Summary | Full Text:PDF(1007.9KB)

Reversible Data Hiding in the VQ-Compressed Domain
Chin-Chen CHANG Yung-Chen CHOU Chih-Yang LIN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2007/09/01
Vol. E90-D  No. 9  pp. 1422-1429
Type of Manuscript:  PAPER
Category: Image Processing and Video Processing
Keyword: 
reversible data embeddingvector quantizationdata hidingsteganography
 Summary | Full Text:PDF(894KB)

A Steganographic Method for Hiding Secret Data Using Side Match Vector Quantization
Chin-Chen CHANG Wen-Chuan WU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/09/01
Vol. E88-D  No. 9  pp. 2159-2167
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
information hidingsteganographyvector quantizationside match vector quantization
 Summary | Full Text:PDF(1.4MB)

Password Authentication without the Server Public Key
Ya-Fen CHANG Chin-Chen CHANG Yi-Long LIU 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2004/10/01
Vol. E87-B  No. 10  pp. 3088-3091
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
passwordauthenticationpublic keypassword guessing attacks
 Summary | Full Text:PDF(201.9KB)

Generalization of Threshold Signature and Authenticated Encryption for Group Communications
Ching-Te WANG Chin-Chen CHANG Chu-Hsing LIN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/06/25
Vol. E83-A  No. 6  pp. 1228-1237
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
digital signaturethreshold signatureauthenticated encryptiondiscrete logarithms
 Summary | Full Text:PDF(562.9KB)

A New Efficient Server-Aided RSA Secret Computation Protocol against Active Attacks
Shin-Jia HWANG Chin-Chen CHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/03/25
Vol. E83-A  No. 3  pp. 567-570
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
server-aided secret computationRSA signature scheme
 Summary | Full Text:PDF(134.5KB)

Conference Key Supervision in a Level-Based Hierarchy
Ching-Te WANG Chin-Chen CHANG Chu-Hsing LIN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/10/25
Vol. E81-A  No. 10  pp. 2219-2227
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
secret-key agreementconference key distribution systemdiscrete logarithm problem level-based hierarchy
 Summary | Full Text:PDF(821.7KB)

A Dynamic Secret Sharing Scheme Based on the Factoring and Diffie-Hellman Problems
Wei-Bin LEE Chin-Chen CHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/08/25
Vol. E81-A  No. 8  pp. 1733-1738
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
secret sharingdiscrete logarithmfactoring problemLagrange polynomialdiffie-hellman problem
 Summary | Full Text:PDF(567.6KB)

Two Efficient Server-Aided RSA Secret Computation Protocols Against Active Attacks
Shin-Jia HWANG Chin-Chen CHANG Wei-Pang YANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/09/25
Vol. E79-A  No. 9  pp. 1504-1511
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
server-aided secret computationRSAsignaturepassive attacksactive attacks
 Summary | Full Text:PDF(699.3KB)

An Efficient Dynamic Threshold Scheme
Shin-Jia HWANG Chin-Chen CHANG Wei-Pang YANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1996/07/25
Vol. E79-D  No. 7  pp. 936-942
Type of Manuscript:  PAPER
Category: Software Theory
Keyword: 
secret sharingthreshold schemedynamic threshold schemediscrete logarithm
 Summary | Full Text:PDF(698.2KB)